Dr. Barbara O'Neill and Carol Kando-Pineda, of the Federal Trade Commission, will present this 90-minute webinar on behalf of the Military Families Learning Network. This 90-minute webinar will include two sections: a general overview of identity theft and discussion about military-specific scams. Topics covered during the first section, presented by Dr. O’Neill, include a definition of identity theft, signs of identity theft, an identity theft risk assessment quiz, types of identity theft, how identity theft occurs, ways to reduce identity theft risk, phishing scams, proactive and reactive identity theft actions, and identity theft resources. Ms. Kando-Pineda plans to discuss getting help for identity theft victims, including the steps they need to take immediately, walking through the new features for consumers on Identitytheft.gov and how they help victims develop a recovery plan, get a heads-up on the latest “imposter” scams, and an update on the Military Consumer campaign and new resources on the way for the military community.
2. Connecting military family service providers
to research and to each other
through innovative online programming
www.extension.org/militaryfamilies
MFLN Intro
Sign up for webinar email notifications at www.extension.org/62831
2
3. Connecting military family service providers
to research and to each other
through innovative online programming
MFLN Intro
Join the Conversation Online!
3
4. Join the Conversation Online!
MFLN Personal Finance
MFLN Personal Finance @MFLNPF
MFLN Group https://www.linkedin.com/groups/8409844
PF SMS icons
PF SMS icons
Military Families Learning Network
4
5. Dr. Barbara O’Neill
•Financial Resource Management Specialist for
Rutgers Cooperative Extension
•Has been a professional, financial educator and
author for more than 35 years.
•Has written more than 1,500 articles for
academic journals, conference proceedings &
other professional publications.
Today’s Presenters
5
Carol Kando-Pineda
•Counsel in the FTC’s Division of Consumer &
Business Education
•She leads FTC teams to create and distribute
free resources to help people spot, stop and
avoid fraud, manage their money and make wise
buys.
•She began her FTC career as a staff attorney
bringing false advertising claims.
6. Question #1:
Has Anyone (or Family Member)
Been an ID Theft Victim?
• Describe the situation
• Who was the fraudster (if known)?
• How was the case resolved?
6
7. Back in the Day….
What did people do when they
wanted to steal a lot of
money?
7
8. Some Famous Bank Robbers in
U.S. History
• Bonnie and Clyde
• John Dillinger
• Willie Sutton
8
9. Today Most Financial Theft Is Done
Through Identity Theft
• A major white-collar crime:
https://www.fbi.gov/about-us/investigate/white_collar
• Thief may not know victim
• No need to use physical violence
• Less risk of being caught
• Technology and carelessness with data help thieves
9
10. What Is Identity Theft?
Fraud committed via the stealing and unlawful
use of key pieces of personal identification
information (PII)
In other words, when bad things happen to
someone’s good name.
10
14. Signs of Identity Theft
• Items in your credit report that aren’t yours
• Calls or letters from creditors, medical providers, or law
enforcement
• Negative notification at a critical point in life
– Buying a home or car
– Applying for a job
• Zero balances in bank accounts
• When a child starts getting credit offers or debt calls
• Delay in processing an income tax refund
• Other?
14
15. Are YOU at Risk For Identity Theft?
Take this 15-question quiz adapted from
Experian to find out
The lower your score, the better
15
16. 1. You receive offers of pre-approved credit and, if you
decide not to accept them, you do not shred them (10
points)
2. You carry your Social Security card (or other
document with your SS number on it) in your wallet (10
points)
3. You do not have a post office box or a locked,
secured mailbox (5 points)
4. You drop off your outgoing mail at an open, unlocked
box or basket (10 points)
5. You have sensitive personal data posted online (e.g.,
a blog or social media) (10 points) 16
17. 6. You do not shred or tear banking and credit
information when you throw it in the trash (10 points)
7. You provide your Social Security number (SSN)
whenever asked (20 points)
– Add 5 points if you provide it orally without checking
to see who might be listening
8. You are required to use your SSN as an employee
or student ID number (5 points)
9. Your SSN is printed on an employee badge that you
wear (10 points)
10. Your SSN or driver’s license number is printed on
your personal checks (20 points) 17
18. 11. You are listed in a Who’s Who Guide (5 points)
12. You carry an insurance card in your wallet and it
contains your SSN or your spouse’s SSN (20 points)
13. You have not ordered a copy of your credit report
for at least two years (10 points)
14. You write checks with a “regular” pen instead of a
gel pen with ink that cannot be “washed” (5 points)
15. You do not believe that people would root around
in your trash looking for credit or financial information
(10 points)
18
19. What Your Identity Theft Risk Score
Means
• 100+ Points: You are at HIGH RISK. You should
purchase a paper shredder and become more
security aware in document handling.
• 50-100 points: Your odds of being victimized are
about average; higher if you have good credit.
• 0-50 points: Congratulations! You have a high
security IQ. Keep up the good work.
19
20. Question #2:
How Were Your Quiz Scores?
• 0 to 50 points? (Lower Risk)
• 50 to 100 points?
• 100+ points? (High Risk)
20
21. FTC Identity Theft Video #1:
How Identity Theft Happens
http://www.youtube.com/watch?v=-IEBVIh7bzc
21
22. FTC Identity Theft Video #2:
Case Stories of Real People
http://www.youtube.com/watch?v=OoPJImjP1ZQ
22
23. Who are Identity Thieves?
• Narcotics users or sellers
• Organized crime and gangs
• Opportunists
• Desperate people
• Employees (business and government)
• Family members or someone close to you
23
25. Driver’s License Identity Theft
• Your driving privileges could be
suspended or revoked
• You could be arrested during a
routine traffic stop for crimes you did
not commit
• Thieves can open bank accounts,
apply for credit, and cash checks in
your name
25
27. “I owe $20,000 on
four credit cards, my
car was repossessed,
and I turn two next
month”
Criminals often use children’s identities, not for credit
fraud, but to obtain a driver’s license, commit crimes,
collect Social Security, and obtain medical treatment
27
27
29. How Identity Theft Occurs
Identity thieves…
• steal wallets and purses containing your ID
• steal your mail
• rummage through trash (“dumpster diving”)
• pose fraudulently as someone else to get your
information (“pretexting”)
• steal data with skimming devices
29
30. Skimming is stealing credit /debit card numbers with a
device that reads and decodes information from the
magnetic strip on the back of credit or debit cards
Skimming Machines
30
31. More Identity Theft Methods
Identity thieves…
• steal business or personnel records at your
workplace
• find personal info in your home
• use info you put on the Internet
• buy personal info from “inside sources”
• “shoulder surf” at ATMs and telephones
31
32. How Identity Thieves
Use Stolen Information
• Open new credit card accounts
• Establish phone or wireless service
• Open new bank accounts and write bad checks
• Counterfeit checks or debit cards
• Buy cars and take out car loans
• Get fraudulent income tax refunds
• Get medical care in a victim’s name
….and more!
32
33. Reducing Identity Theft Risk
• Destroy credit card applications, receipts, bank, and
billing statements
• Avoid giving your SSN unless it’s absolutely
necessary -- use other identifiers
• Pay attention to billing cycles
• Guard your mail from theft
• Put passwords on smart phones
• Don’t let your credit card out of your sight
33
34. More Ways to Reduce
Identity Theft Risk
• Carry as little identification info as possible
• Limit the number of credit cards you carry
• Don’t give personal identification info on the
phone unless you initiate the call
• Be cautious with personal info in your home
• Check who has access to personal info at work
• Clean out your car
34
35. Still More Ways to
Reduce Identity Theft Risk
• Don’t carry your SS card
• Save ATM and credit card receipts to check
against statements
• Alert family members to dangers of pretexting
• Make sure your credit reports are accurate
• Write checks with uniball gel pens
35
36. Question #3:
Can You Suggest Any Other Identity
Theft Risk Reduction Strategies?
36
38. Look-Alike (Fake) Web Sites
• Spoof e-mail messages sent to “verify” or
“update” account info
• Appears to come from reputable company
– Example: eBay, Best Buy, banks, merchants
• Looks “legitimate”
• Scam is called “phishing”
– Get people to disclose sensitive data
– Data used to commit identity theft
38
39. Red Flags of a Phishing Scam
• E-mails that direct users to a Web site to
“validate” or “update” info
• Threats that accounts will be closed
• Grammatical errors and typos
• Lack of a specific contact person, phone
number, or address
• Words Like “Urgent” and “Immediately”
39
40. Phishing Video: Symantic Guide to
Scary Internet Stuff
http://www.youtube.com/watch?v=K8lWLwuiDwk
40
41. Steps To Avoid Phishing
• Be cautious: African refugees with $10 million,
suspended FDIC insurance, etc.
• Realize that banks never ask for account info,
especially in an e-mail
• Ditto for the IRS
• Don’t click on any links in suspicious e-mails
• Report suspicious e-mails to companies and
spam@uce.gov
• D-E-L-E-T-E 41
42. Phishing Sample #1
After the last annual calculations of your fiscal activity
we have determined that you are eligible to receive a
tax refund of $92.50. Please submit the tax refund
request and allow us 3-6 days in order to process it. A
refund can be delayed for a variety of reasons. For
example submitting invalid records or applying after the
deadline.
To access the form for your tax refund, please click:
http://easy-classifieds.com/Internal/Revenue/service/verify.
Regards, Internal Revenue Service 42
43. Phishing Sample #2
ATTN: An Iraqi made a fixed deposit of 44.5m usd in my bank branch and he
died with his entire family leaving behind no next of kin,am ready to share
70/30 with you if you choose to stand as my deceased client next of kin.
Pls indicate by sending the following below to show your interest. 1.YOUR
NAME 2.YOUR RESIDENT ADDRESS 3.YOUR OCCUPATION 4.YOUR
PHONE NUMBER 5.DATE OF BIRTH 6.COUNTRY OF RESIDENT 7. ANY
FORM OF YOUR IDENTIFICATION OR INTERNATIONAL PASSPORT
Your response with the requested information should be sent to reach me at
my personal email address below: yi.simon19@gmail.com
Yours Truly, Simon Yi
43
44. Phishing Sample #3
Attention: Beneficiary I wish to use this medium and my office to inform you
that your CONTRACT/INHERITANCE Payment of USD10,500,000.00 only
from CENTRAL BANK OF NIGERIA has been RELEASED and APPROVED
for onward transfer to you via ATM CARD which you will use in withdrawing
your funds in any ATM SERVICE MACHINE in any part of the world, but the
maximum you can withdraw in a day is USD$10,000 Only.
The United States government has mandated the CENTRAL BANK OF
NIGERIA, to send you the ATM CARD and PIN NUMBER. Therefore You are
advised to contact the Head of ATM CARD Department of the CENTRAL
BANK OF NIGERIA for further instructions on how to dispatch your ATM
CARD to you.
Name: REV FR MARTINS UZOR DIRECTOR ATM DEPARTMENT OF CBN
Email: lap111@blumail.org
44
45. Spear Phishing
• Instead of casting out thousands of random e-mails,
spear phishers target victims more personally
– May have stolen ID info
– People that attend the same college OR use the
same bank OR work for same employer, etc.
• E-mails to victims are more “personal,” which makes
them dangerous and deceptive
45
47. Rutgers Cooperative Extension
Online Identity Theft Quiz
www.rce.rutgers.edu/money/identitytheft/default.asp
The online quiz provides both
personalized feedback to users and
a database for ongoing research
47
48. 2014 Study Findings
• The higher the score, the more frequently identity theft risk
reduction practices are performed. The mean quiz score
was 73.58 out of 100. Mean scores for individual quiz items
ranged from 2.50 to 4.48 (1= Never, 5 = Always)
• Two areas of weakness were checking one’s credit report
annually (2.65) and securing incoming mail (2.50).
• Almost two-thirds (64.4%) of respondents scored between 70
and 100. The three risk reduction strategies that were
performed most frequently (mean score above 4) were not
divulging one’s SSN, not printing sensitive data on
checks, and practicing “general security consciousness”
48
50. Key Follow-Up Actions
Fraud Alert
A fraud alert notifies lenders
to take precautions to check
your identity before extending
credit
Credit agency has to call you
to confirm ant request it
receives to open an account
in your name
Credit Freeze
A credit freeze is a more
serious step. It denies lenders
and others (except those you
already have a relationship
with) access to your credit
report so they can’t extend
credit
Keeps everyone- including
YOU- from applying for
additional credit
50
51. Identity Theft Resources
• Reporting Identity Theft (FINRA):
http://www.saveandinvest.org/protect-your-money-report-fraud/r
• Identity Theft Affidavit (FTC):
http://www.consumer.ftc.gov/articles/pdf-0094-identity-theft-affid
• Identity Theft IQ Test (Privacy Rights Clearinghouse):
https://www.privacyrights.org/itrc-quiz1.htm
• Identity Theft and Your Social Security Number (Social
Security Administration):
https://www.ssa.gov/pubs/EN-05-10064.pdf
51
53. Tax, medical & child identity theft
and imposter scams
Carol Kando-Pineda
Federal Trade Commission
53
54. Tax Identity Theft
• Using someone else’s Social Security
number to file a fraudulent tax return
(or a deceased taxpayer’s information to get their
refund)
•Claiming someone else’s children as
dependents
54
55. Warning Signs
• Social Security number is lost, stolen, or
compromised
• Unusual delay in getting a refund
• IRS notification:
– duplicate tax return filing
– unreported income
55
56. Immediate Steps for Victims
• Contact the IRS Identity Protection Specialized Unit at
800-908-4490 (8 a.m. to 8 p.m., local time)
• File IRS Identity Theft Affidavit (Form 14039)
• Have valid govt-issued identification
– Social Security card, driver’s license, or passport)
• When resolved, you’ll get an Identity Verification PIN
• Go to: irs.gov/identitytheft
56
57. Step 1: Call the companies where you
know fraud occurred
Call the fraud department
Explain that someone stole your
identity
Immediate Steps for Victims
57
58. Step 2: Place a fraud alert and get your
credit report
www.annualcreditreport.com or 1-877-322-8228.
Immediate Steps for Victims
58
59. Step 3: Report identity theft to the FTC
Complete the online form or call 1-877-438-
4338. Include as many details as possible
Immediate Steps for Victims
59
60. Step 4: File a report with your local police
department
Bring ID with photo, proof of address
Immediate Steps for Victims
60
63. Preparing and Filing Tax Returns
• Know your tax preparer
• Mail tax returns as early in the tax season
as possible
63
64. Preparing and Filing Tax Returns
• Keep them safe:
–Not in outgoing mail
–Secure network to transmit
–Lock up copies
–Shred, shred, shred
64
65. Preparing and Filing Tax Returns
• Minimize personal information in purses
or wallets, or on smartphones
• Do not respond to unsolicited emails and
calls that appear to be from the IRS
65
66. Medical Identity Theft
• Read every “Explanation of Benefits” statement you
get from your health insurer
• Follow up on any item you don’t recognize
• Check your benefits
66
67. Medical Identity Theft
• Contact each doctor… or clinic, hospital, pharmacy,
laboratory, and health plan where the thief may have used
your information
• Get your records. Complete the providers’ records request
forms and pay any fees required to get copies of your records
• Check your state’s health privacy laws. Some state laws make
it easier to get copies of your medical records
67
68. Medical Identity Theft
• Review your medical records, and report any errors to your
health care provider
• Write to your health care provider to report mistakes in your
medical records
• Notify your health insurer
– Send your Identity Theft Report to your health insurer’s
fraud department
– Tell them about any errors in your medical records
68
69. Child Identity Theft
• Follow the usual steps for What To Do Right Away
and What To Do Next with 2 exceptions:
• Ask (phone or email) for a search based only on
your child’s Social Security number (SSN)
– Equifax
1-800-525-6285
– Experian
1-888-397-3742
– TransUnion.com
childidtheft@transunion.com
69
70. Child Identity Theft
• Send each credit reporting agency the Minor’s Status
Declaration [PDF] form
– It’s proof that your child is a minor
– Include a letter asking that all information associated with
your child’s name or SSN to be removed
70
80. Imposter complaints to FTC have skyrocketed
CY2013 126,000
CY2015 350,000
IRS complaints alone are up to 228,000
(from 64,000 in CY 2013)
Imposter Scams
80
81. The Great Pretenders
• The stories change but the ending is
always the same…
–IRS and Other government imposters
–Online romance
–Family emergency
–Business/Tech support
81
82. • Scammers posing as the IRS call and say you owe
taxes
• They might also:
– know all or part of your SSN
– rig caller ID to make it look like call is from DC (202 area
code)
Imposter Scams
82
83. Imposter Scams
• Imposters might:
– threaten arrest or deportation
– demand immediate payment
• pre-paid debit card or wire transfer
– send you bogus IRS emails to further the scheme
83
84. What you need to know
• The IRS will not:
– ask you to pay with prepaid debit cards or wire
transfers
– ask for a credit card number over the phone
– threaten arrest, deportation or loss of your
drivers license
– send you emails without prior contact
84
85. What you need to know
• If the IRS needs to contact you,
– they will first do it by mail
• If you have any doubts,
– call the IRS directly at 800-829-1040
85
89. What is one significant thing you
learned today?
89
90. Key Takeaways
• Identity theft uses “no tech” and high tech methods
• Minimize the amount of information that can be
stolen from you
• You cannot control every identity theft risk factor
• Identity theft is a crime that should be reported
• Act immediately to stop further use of your identity
90
91. Evaluation and Continuing Education
Credits/Certificate of Completion
MFLN Personal Finance is offering 1.5 credit
hours for AFC-credentialed participants through
AFCPE and CPFCs through FinCert.
To receive a certificate of completion, please
complete the evaluation and post-test at:
https://vte.co1.qualtrics.com/SE/?
SID=SV_2aYT6lxWbYLzI2x
Must pass post-test with an 80% or higher to
receive certificate.
91
92. Personal Finance Upcoming Event
Life Insurance Basics for Military Families
• Date: April 5, 2016
• Time: 11 a.m.-12:30 p.m. Eastern
• Location:
https://learn.extension.org/events/2496
For more information on MFLN Personal Finance go to:
https://blogs.extension.org/militaryfamilies/category/per
sonal-finance/
92
Identity theft happens when someone steals your personal identifying information in order to open new charge accounts, order merchandise, or borrow money. Review list of identifying information in the slide.
A person targeted by an identity thief usually doesn’t know he or she has been victimized until the thief fails to pay the bills or repay the loans, and collection agencies begin hounding the person (whose identity has been stolen) for payment of accounts that he/she didn’t even know he had.
Other fraudulent activities that identity thieves perpetrate are:
taking over the victim’s financial accounts,
opening new bank accounts,
applying for Social Security benefits,
renting apartments, and
establishing services with utility and phone companies.
Some people say take my credit, or that I am good at protecting my information, BUT WHAT ABOUT EVERYONE ELSE are they protecting your information.
Unlike the drug trade one transaction one product, with your information it can be sold over and over again
Pill bottle
There is no accurate profile for an identity thief.
This is their job
They love the challenge, adrenaline rush and money
Most people recognize that there is much less risk in identity theft than most common crimes, and a relatively high return on the time invested.
Of those who know how they were victimized, more than half of the criminals were family members, or other close acquaintances.
Despite your best efforts to take precautions with accessibility to your personal information or to keep it private, skilled fraudsters may use a variety of methods -- low- and high-tech -- to gain access to your data and your life.
According to the FTC, this is how identity thieves get your personal information:
They steal wallets and purses containing your identification and credit cards, and ATM cards.
They steal mail from your mailbox, including your bank and credit card statements, bills from retail stores, pre-approved credit offers, telephone calling cards, as well as tax information.
They fill out a “change of address forms” to divert your mail to another location.
They rummage through garbage cans or the refuse of businesses for personal data that has been discarded in a practice known as “dumpster diving.”
They commit fraud to obtain your credit report by posing as a landlord, employer, or someone else who may have a legitimate need for and legal right to -- the information.
Your information is than downloaded to a computer using the device obtaining your name and expiration date.
Also, blank cards can be bought and using a credit card encoder can put your credit card info into the blank card making available for the criminal to use it.
Here are several more ways you can have your identity stolen by fraudsters:
They get your business or personnel records at work. This is usually an “inside job,” done sometimes by a disgruntled employee.
They find personal information in your home -- perhaps they are sharing an apartment with you.
They use personal information you share on the Internet.
Web sites, particularly e-commerce sites, collect a lot of data from visitors. If you buy a book or a CD at a bookstore and pay cash, there will be no record linking you to the purchase. But the books, magazines, music, and movies you buy online are all linked to you by name. Web retailers are collecting a sizable database of information on individual purchases (e.g., who’s buying certain prescription drugs or books).
E-commerce sites routinely share your information, or sell it. If an e-commerce site you bought from goes bankrupt, it could be legally required to sell your data to the highest bidder as a company asset. Also, sites routinely sell or exchange your personal information. Privacy advocates are seeking federal legislation requiring Web sites to let users “opt out” of sharing data, as has recently happened in financial services.
Sometimes identity thieves buy your personal information from “inside” sources. For example, an identity thief may pay a store employee for information about you that appears on an application for goods, services or credit.
Identity thieves also do some of their best work just by looking over your shoulder (a.k.a., “shoulder surfing”) as you dial your telephone calling card number or punch in your account number or PIN at an automated teller machine (ATM). To avoid having account data stolen in this manner, shield the key pads with your hand whenever you use a public phone or ATM.
Once identity thieves have secured a piece of your personal identification, it is relatively easy to use it to wreak havoc on your life. They may use it for a number of illegal activities such as:
Calling your credit card issuer and pretending to be you. They then ask to change the mailing address on your credit card account. Next, they run up charges on your account. Because your bills are being sent to the new address, it make take some time before you realize there’s a problem.
Opening a new credit card account using your name, date of birth, and Social Security number. When they use the credit card and don’t pay the bills, the account now in default is reported on your credit report.
Establishing phone, cable, or wireless service in your name. Again, these bills go unpaid until service providers contact the victim looking for payment.
Opening a bank checking account in your name and writing bad checks on it.
Filing for bankruptcy under your name to avoid paying debts they’ve run up under your name, or to avoid eviction from their apartment.
Counterfeiting checks or debit cards, and draining your bank account.
Getting access to a PIN number and draining your retirement account.
Buying cars by taking out auto loans in your name.
Buying other big ticket items and charging them on store accounts, then never making a payment.
The Federal Trade Commission acknowledges that, while you probably can’t prevent identity theft entirely, you can lessen your risk. By managing your personal information wisely, cautiously, and with an awareness of the dangers, you can help protect against identity theft.
Here are the best ways to minimize your risk:
Store items with personal information in a safe place. To foil an identity thief who may pick through your trash to retrieve personal information, tear up charge receipts, copies of credit applications, insurance forms, physicians’ statements, and bank checks and statements that you are discarding, as well as expired charge cards and credit offers you get in the mail. Better still, purchase an inexpensive shredder.
Give your Social Security number (SSN) only when absolutely necessary. Ask to use other types of identifiers when possible.
Pay attention to your billing cycles. Call your creditors if your bills don’t arrive on time. A missing credit card bill could mean a fraudster has taken over your credit card account and changed your billing address to cover his tracks.
Guard your mail from theft. Deposit outgoing mail in post office collection boxes or at your local post office. Don’t leave mail unattended at your residence mail box to be picked up. Promptly remove mail from your mailbox after is has been delivered. If you’re planning to be away from home and can’t pick up your mail, call your local post office to request a vacation hold. The Postal Service will hold your mail at your local post office until you can pick it up.
Ask to establish passwords on your credit card, bank and phone accounts. Avoid using easily available information like your mother’s maiden name, your birth date or your spouse’s, the last four digits of your SSN or your phone number, or a series of consecutive numbers, like 1, 2, 3, 4.
Here are some additional identity theft precautions:
Carry as little identification information and as few credit cards on your person as possible. Carry only what you’ll actually need and leave the rest at home.
Do not give out personal information on the phone, through the mail, or over the Internet unless you have initiated the contact or know who you’re dealing with. Identity thieves often pose as representatives of banks, Internet service providers, and even government agencies, to persuade you to reveal your Social Security number, financial account number, and other identifying information. Legitimate organizations with whom you do business already have the information they need and will not ask you for it.
Be cautious about where you leave personal information in your home, especially if you share an apartment with roommates, employ housekeeping or outside help, or are having service work done in your home.
Be aware of who has access to your personal information at work and verify that the records are kept in a secure location. This is particularly important if you are in a position where you may have dealings with disgruntled employees.
Here are several more ways to protect your personal information:
Don’t carry your SSN card in your wallet; leave it in a secure place at home.
Save your ATM and credit card receipts to check against your bank and credit statements. Review them carefully and promptly.
Alert family members to the dangers of pretexting. Tell them that only you, or someone you authorize, should provide personal information to others.
Before you reveal any personally identifying information, find out how it will be used and whether it will be shared with others. Ask for their specific policies about sharing information. Can you choose to have it kept confidential?
Order a copy of your credit report from each of the three major credit reporting agencies every year. Make sure that it’s accurate and includes only those accounts and credit transactions that you’ve authorized. One credit report per year is free from each of the major credit bureaus for New Jersey residents.
A credit file request form is available on the Rutgers Cooperative Extension MONEY 2000 Web site at www.rce.rutgers.edu/money2000.
How does tax IDT happen?
The usual ways -- Lost or stolen wallets, Medicare cards, smartphones
Theft
family, friends, visitors, advisors
dumpster diving
mail or tax returns
Unsolicited calls asking for personal information
Buying information from corrupt insiders or volunteers at:
banks, debt collectors
hospitals, clinics, medical offices, nursing homes
prisons
schools, government offices
tax preparation services
STEP 1 – Call the Companies
- Ask them to close or freeze the accounts. Then, no one can add new charges unless you agree.
- Change logins, passwords and PINS for your accounts.
You might have to contact them again once you have your Identity Theft Report
STEP 2 – Fraud Alert
You’ll get a letter from each credit bureau -- confirms that they placed a fraud alert on your file.
Get your free credit report right away.
Go to annualcreditreport.com or call 1-877-322-8228
Did you already order your free annual reports this year?
you can pay to get your report immediately.
Or follow the instructions in each fraud alert confirmation letter to get a free report, but it might take longer.
STEP 3 – Report to FTC
create an account, we'll walk you through each recovery step, update your plan as needed, track your progress, and pre-fill forms and letters for you.
If you don't create an account, you must print and save your Identity Theft Affidavit and recovery plan right away. Once you leave the page, you won't be able to access or update them.
STEP 4 – Police
Go to your local police office with:
- a copy of your FTC Identity Theft Affidavit
a government-issued ID with a photo
- proof of your address (mortgage statement, rental agreement, or utilities bill)
any other proof you have of the theft (bills, IRS notices, etc.)
Ask for a copy of the police report (you’ll need this for other steps)
Trouble getting the police report – try bringing this memo with you:
FTC's Memo to Law Enforcement [PDF]
The Identity Theft Report guarantees certain rights – like getting fraudulent info off your credit report, get the extended fraud alert
Do not put tax returns in outgoing mail; mail tax returns directly from post office
If filing electronically, use a secure network and encrypt
Store copies of your returns in a secure place
Shred drafts, calculation sheets, and extra copies
At least once a year, ask the health insurers you’ve been involved with for a list of the benefits they paid in your name.
Did your provider refuse to give you copies of the records to protect the identity thief’s privacy rights?
You can appeal.
Contact
the person listed in your provider’s Notice of Privacy Practices,
the patient representative, or
the ombudsman.
Explain the situation and ask for your file.
If the provider refuses to provide your records within 30 days of your written request,
- you may complain to the U.S. Department of Health and Human Services Office for Civil Rights.
Include a copy of the medical record showing the mistake.
Explain why this is a mistake, and how to correct it.
Include a copy of your Identity Theft Report.
Send the letter by certified mail, and ask for a return receipt.
health care provider should respond to your letter within 30 days. Ask the provider to:
fix the mistake and
notify other health care providers who may have the same mistake in their records.
medical billing errors on your credit report,
- notify all 3 credit reporting companies.
Write down who you contacted and when.
- Keep copies of any letters you send.
Largest telephone scam in TIGTA’s history
800,000+ contacts across the US
Over $14M paid to scammers
Top 5 states* affected (by dollar loss):
- California - Florida
- New York - Virginia
- Connecticut
Mention – private debt collection issue
At 10 minutes before the published end time, presenter or facilitator invite participants to answer this question in text. Wait at least 60 seconds for replies.
Thank participants for attending and for responding and ask a Follow up question verbally: “What will you DO with the information you learned?”
Discuss responses, then ask of all participants “What else do you have questions about regarding today’s topic?” Wait a minimum of 60 seconds.
Answer questions and provide additional resources as appropriate.
To minimize the amount of information a thief can steal, do not carry extra credit cards, your Social Security card, a birth certificate or a passport in your wallet or purse, except when needed.
To reduce the amount of personal information that is “out there,” consider removing your name from the marketing lists of the three credit reporting bureaus. This will limit the number of pre-approved offers of credit that your receive.
* Sign up for the Direct marketing Association’s Mail Preference Service and the Telephone
Preference Service. Your name is added to computerized name deletion lists used by nationwide
marketers.
* Have your name and address removed from the phone book and reverse directories (i.e., directories that list people by their addresses rather than their names).
* Don’t put your Social Security number on checks.
Ask your financial institution to add extra security protection to your account. Most will allow you to use an additional code (a number or word) when accessing our account.
If you become a victim of identity theft, report the crime to the police immediately. Give them as much documented evidence as possible, and get a copy of the police report. Credit card issuers, banks, and the insurance company may require you to show the report in order to verify the crime. Then report your case to the federal authorities. The Federal Trade Commission has a special identity theft hotline to provide information to consumers and take complaints from victims by phone (1-877-438-4338) or online (www.consumer.gov/idtheft).
As soon as possible, call the fraud units of the three major credit bureaus. Ask to have a fraud alert placed on your credit report -- this will let companies know that someone else has been using your information and that you wish to be informed by phone before any new credit is granted. Close the accounts and get replacement cards with new account numbers.